WO2007113464A1 - Method and device for obtaining item information using rfid tags - Google Patents
Method and device for obtaining item information using rfid tags Download PDFInfo
- Publication number
- WO2007113464A1 WO2007113464A1 PCT/GB2007/000851 GB2007000851W WO2007113464A1 WO 2007113464 A1 WO2007113464 A1 WO 2007113464A1 GB 2007000851 W GB2007000851 W GB 2007000851W WO 2007113464 A1 WO2007113464 A1 WO 2007113464A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- item
- rfid
- predetermined
- trigger signal
- rfid response
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 36
- 230000004044 response Effects 0.000 claims abstract description 91
- 238000004806 packaging method and process Methods 0.000 claims 2
- 239000000047 product Substances 0.000 description 46
- 230000003287 optical effect Effects 0.000 description 18
- 238000005516 engineering process Methods 0.000 description 17
- 239000003814 drug Substances 0.000 description 13
- 229940079593 drug Drugs 0.000 description 10
- 230000006870 function Effects 0.000 description 9
- 239000000825 pharmaceutical preparation Substances 0.000 description 9
- 238000013459 approach Methods 0.000 description 8
- 229940127557 pharmaceutical product Drugs 0.000 description 8
- 238000010367 cloning Methods 0.000 description 7
- 238000004519 manufacturing process Methods 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 230000008901 benefit Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000012795 verification Methods 0.000 description 4
- 206010016275 Fear Diseases 0.000 description 3
- 238000004891 communication Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 239000003962 counterfeit drug Substances 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 201000010099 disease Diseases 0.000 description 2
- 208000037265 diseases, disorders, signs and symptoms Diseases 0.000 description 2
- 238000002372 labelling Methods 0.000 description 2
- 239000006187 pill Substances 0.000 description 2
- 230000002265 prevention Effects 0.000 description 2
- 230000005855 radiation Effects 0.000 description 2
- 239000000523 sample Substances 0.000 description 2
- 239000000758 substrate Substances 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 208000030507 AIDS Diseases 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 239000013065 commercial product Substances 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 238000001647 drug administration Methods 0.000 description 1
- 230000005672 electromagnetic field Effects 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000004941 influx Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000001678 irradiating effect Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000010076 replication Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000003860 storage Methods 0.000 description 1
- 238000005728 strengthening Methods 0.000 description 1
- 230000003319 supportive effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0723—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
Definitions
- the present invention relates to methods and systems for obtaining information about items, such as commercial products, from item information sources, such as product information databases. More specifically, the present invention relates to methods and systems for obtaining item information from an item information source by virtue of an item identification means, such as a visually readable label providing item identification information, and an RFID response means, such as an RFID tag, arranged to provide a predetermined response on being subjected to a currently applicable trigger signal.
- an item identification means such as a visually readable label providing item identification information
- RFID response means such as an RFID tag
- Radio Frequency Identification is an identification technology which relies on storing and retrieving data using devices called RFID tags.
- An RFID tag is in general a small object capable of functioning as a label, that can be attached to or incorporated into an item such as a commercial product, an animal, or a person.
- an RFID tag consists of a small integrated circuit with a small storage capability and a radio antenna.
- tags referred to as “active tags” have an internal power source which is generally used to power any processing circuitry and to generate outgoing signals.
- tags referred to as “passive tags” do not have any internal power source. Passive tags generally obtain the energy required for responding to incoming signals and generating outgoing signals by collecting power from an electromagnetic field generated by a reader.
- tags there exist tags known as “semi-active" (or sometimes “semi-passive") tags, which generally have a small power source in order to enable the tag's processing circuitry to be powered constantly. These tags therefore do not need to collect power from incoming signals before commencing any processing, allowing them generally to provide faster responses than passive tags, but active and semi-active tags are generally more expensive than passive tags.
- An RFID tag generally holds identity information at least relating to an item with which it is associated.
- Current RFID tags typically offer a 96-bit identifier number that can be globally unique and addressable.
- identity information may point to a unique location in a database in which detailed information about the item may be stored. This may include product characteristics, data about the origin of the item, the identity of a manufacturer and other manufacturing details, pricing information, any appropriate expiry dates, etc.
- RFID technology is thought to be a possible at least partial replacement for barcode technology, for which there exists a standard called the Universal Product Code (UPC).
- UPC Universal Product Code
- An RFID tag can provide an identification number, as can a barcode, but unlike barcodes, RFID tags can be read at a distance without a line-of-sight requirement, and without human intervention. Due to this and due to their small size, RFID tags can be placed in boxes with, or even inside consumer items, can be attached to clothes, and can be used in a wide variety of other applications.
- RFID tag technologies have been in use for many years but major technology development has happened in the last few years in particular through the Auto-ID Center in collaboration with the MIT.
- An aim was to make RFID tag as simple as possible, with very small chips and a cost per tag of less than 0.1 US$.
- RFID tags will realistically start to replace the barcodes presently used in relation to many consumer products, and economies of scale will then enable research into new applications. It is likely that the first tags of a sufficiently small size and having a low- enough cost for the above will be passive tags.
- RFID technology can immediately improve on barcode technology and other labelling systems based purely on visible markings, thus helping to eliminate illegal markets based on fake goods such as counterfeit pharmaceutical products; pharmaceutical products and other perishable items that should have been taken off the market due to their age or "sell by" date; counterfeit fashion items such as clothing and jewellery; consumer electronics devices; and many other goods.
- barcodes can essentially be simply photocopied, such that on being read or "scanned", the copy will provide the same data as the original, RFID tags cannot be so easily copied. They cannot generally even be "scanned” without the correct hardware, and various levels and types of encoding and authentication techniques can be used to protect data stored on or associated with them.
- the first approach depends on authenticating a specific product through a label or a hologram that cannot be easily copied.
- the prevention of counterfeiting of items such as currencies, passports, cheques, bank cards, credit cards, optical disks and the like can be addressed by associating the item with a label that has optical security properties, and encoding optical data decipherable only by optical means therein.
- the label can be manufactured with different optical properties.
- the label film can comprise multiple substrates, the different substrates having different colours and different optical properties.
- the image produced by the label can change depending on the viewing angle.
- the labels may be human-readable or readable only using a specific optical reader.
- a similar approach is to create labels that reflect light in different ways.
- a reflective label can be designed to reflect light radiation of predetermined wavelengths while substantially absorbing or transmitting light radiation of other predetermined wavelengths irradiating the same location on the label surface.
- the main idea is to use a unique ID number to authenticate a product.
- the unique ID can be used to create an electronic pedigree system that allows for an end-to-end view of the product life cycle.
- a pharmaceutical bottle or package may contain an RFID tag that generates a unique identifier.
- the identifier can be a number in plain text or may be encrypted.
- a solution proposed by VeriSign is based on a tag that incorporates a 1024-bit encryption key and uses the same encryption technology proposed by smart card solutions.
- cloning of RFID tags is generally harder and more expensive than the copying of barcodes and other labels according to systems based on visible markings, but it is not impossible.
- cloning a standard tag for example an EPC Generation 2 tag
- the reader simply reads the original tag then writes the collected information to a blank tag.
- a final class of attack is hardware reverse-engineering. In this case an attacker physically probes the tag using microscopes or radio emissions from the tag circuit.
- Passive tags generally are more likely to be susceptible to the risks of cloning than active tags because in the absence of an internal power supply, their circuitry is generally less complex than that on active tags. This can result in them being easier to probe using microscopes, radio emissions or otherwise. It can also mean that any access control provided through a reading protocol is likely to be less secure than mechanisms such as "RSA" or elliptic curve cryptography used on active tags.
- a method for obtaining from an item information source item information relating to an item said item having associated therewith an item identification means providing item identification information and an RFID response means arranged to provide a predetermined response on being subjected to a currently applicable trigger signal; said method comprising the steps of: establishing from said item identification means item identification information; using said item identification information to determine from said item information source a currently applicable trigger signal for said RFID response means; subjecting said RFID response means to said currently applicable trigger signal; receiving a predetermined response from said RFID response means; and using said predetermined response to obtain item information from said item information source; wherein the RFID response means is arranged to generate a new currently applicable trigger signal and a new predetermined response associated therewith following the subjecting of said RFID response means to said currently applicable trigger signal.
- a device for enabling a user to obtain from an item information source item information relating to an item said device comprising an item identification means for providing item identification information, and an RFID response means
- said item identification means comprises means from which can be established item identification information in dependence on which a currently applicable trigger signal for said RFID response means can be determined from said item information source
- said RFID response means comprises means arranged to provide a predetermined response on being subjected to said currently applicable trigger signal, in dependence on which predetermined response item information can be obtained from said item information source
- said RFID response means further comprising means arranged to generate a new currently applicable trigger signal and a new predetermined response associated therewith following the subjecting of said RFID response means to said currently applicable trigger signal.
- the RFID response means and the information source may thus act independently of each other in generating the same new currently applicable trigger signal and predetermined response following the subjecting of the RFID response means to the currently applicable trigger signal. It will also be understood that this differs from prior art such as Weis et al and Henrici et al above, in which the fundamental process is (a) read; (b) update tag. Embodiments of the present invention use a process in which the order of events can be summarised as (a) trigger; (b) read and update. This is made possible by the RFID response means essentially updating itself, rather than relying on receiving a further communication from the information source with updated information.
- the RFID response means may independently compute or select a new read key simultaneously with, or at the same process stage as, a back-end system, and a successful update to the item identification information may thus be guaranteed on both sides if the RFID response means is successfully read.
- Embodiments of the present invention present methods and systems allowing a user to obtain assurance, indirectly at least, that an item such as a product is original, authentic, genuine, or otherwise "valid", and is not a "pirated” copy, for example.
- embodiments of the invention allow a user to verify that a label, a tag or another such marking or information means attached to or otherwise associated with the item and having an RFID component is original, authentic, genuine, or otherwise valid, and in particular that the RFID component itself is not a copy or clone, and by virtue of such verification, to obtain assurance relating to the origin and/or authenticity of the item itself.
- the item identification information which may be provided by means of a barcode printed on the item or on a label associated with the item, may effectively reference restricted-access password information available from the item information source which will be required, at a later stage in the authentication procedure, to access restricted-access unique identity information stored using an RFID component of the label, such as an RFID tag.
- the initial item identification information may however be visible to the naked eye, and may even be provided in a form understandable to any user, but if additional security or privacy is required at this stage, the item identification information may itself be hidden, encoded or encrypted. It may provided by the same or a different RFID component, for example.
- Preferred embodiments may be used for checking product authenticity with reference to a secure database, provided by a trusted "third party" for example.
- a secure database provided by a trusted "third party" for example.
- This may be an on-line database openly accessible to the public or with restricted access. This may be achieved by password-protection or otherwise. Further flexibility in the level of security required may be provided by means of access controls to this item information source whenever it is to be consulted.
- embodiments of the invention are arranged to make any successfully "eavesdropped" information immediately useless to the eavesdropper by virtue of the fact that the currently applicable trigger signal and the predetermined response will have been changed before the eavesdropper has the opportunity to subject the RFID response means to the eavesdropped trigger signal.
- Preferred "embodiments of the invention make use of a cryptographic scheme that uses one-way or hash functions to enable the generation of one-time access passwords and authentication codes in the tag in such a way that even an eavesdropper who has successfully eavesdropped a sequence of passwords and/or authentication codes over a period of time will find it very difficult or impossible to deduce further passwords and/or authentication codes that may still be applicable.
- some embodiments enable the tracking of items along a supply-chain from a manufacturing facility to a wholesaler and then to a retailer, and can be used to support secure "pedigree” solutions such as those applicable in the case of pharmaceutical items, for example.
- Embodiments of the invention allow for various other improvements over prior systems, including the following:
- the RFID tag may be arranged that only a party having access to the trusted third-party database can access the information contained in the RFID tag.
- This approach prevents malicious users from creating a clone of a tag that produces "correct" information. Even if an attacker is able to eavesdrop the reading password and the unique identifier generated by the tag this information will not enable the attacker to clone the tag.
- the reading password and the unique identifier can only be used once, so can be regarded as being equivalent to a "one time password".
- a "one time password” provides a way to enable a secure pedigree model.
- the information can be logged in a specific data file that maintains specific information about the specific product.
- the data file may represent a history of the product and may describe the different locations at which the product has been observed.
- a malicious user is prevented from generating false pedigrees by claiming that a product has been at a particular location because the trusted third party has control over the access passwords and unique identifiers generated by the tag. This requires that only authorised parties have access to the trusted third party database.
- preferred embodiments of the present invention may enable or contribute towards any or all of the purposes outlined below, for example:
- Figure 2 is a representation of the components involved in an "authentication" operation performed according to a preferred embodiment of the invention
- Figure 3 is a flow-chart showing the steps involved in an "authentication" operation performed according to a preferred embodiment of the invention
- Figure 4 shows a scheme for generating a sequence of unique IDs for an RFID tag. Description of the Embodiments
- Figures 1 (a) and 1 (b) represent two ways in which a pharmaceutical product may be packaged and labelled.
- a "blister-pack" 10 of pills 11 is shown having attached thereto an optical label 12, which may be a barcode, a 2-D code, a matrix-code, or a label with an item identification number printed thereon for example, and an RFID tag 14.
- an optical label 12 is printed on an outer packet 16 associated with the blister-pack 10.
- the optical label 12 is also shown printed on the blister-pack 10, but Fig.
- FIG. 1(b) illustrates the point that while an optical label generally needs to be visible to be read, an RFID tag may be readable when located within a pack, or even within an object itself. It will also be noted that neither the optical label nor the RFID tag need to be physically attached to the item in question. Either may be associated in some other manner, as indicated by Fig. 1 (b).
- FIG. 2 shows a combined label associated with an item 10, the label having a barcode 12 (serving as an optical item identification component) and an RFID tag 14; a verifier 20, which in this figure is shown as a combined information transfer device having functionality as a barcode reader and an RFID reader; and a trusted third- party database 30.
- a complete "authentication" operation involves the following steps, which are indicated in boxes on Figure 2, and which correspond to those shown in the flow-chart of Figure 3:
- Step 1 "Optical reading”: The party wanting to verify the authenticity of the item, who will be referred to here as the "user”, uses the barcode reader functionality of the verifier 20 to read the optical label 12 in order to establish the identity of the item from the barcode associated the item. (It will be noted that while the identity information from the barcode component 12 of the label should uniquely identify the item 10, it may be a copy, and may not provide any level of assurance that the item is authentic. The level of assurance provided by the barcode in this instance may be thought of as equivalent to the level of assurance provided by a simple RFID tag used to check a product on a pedigree database in prior systems such as those outlined above.)
- Step 2 "Online Access”: Once the user has made contact with the database 30, using any appropriate passwords or other security checks, the item identity information is sent to the database 30, having been transferred electronically from the barcode reader part of the verifier 20, entered manually by a user, or otherwise.
- Step 3 “Provision of Read Password”: Provided that the item identity information corresponds to an item represented in the database, and that there is no reason to block the user's attempt to obtain a READ password for the item in question, the user receives the currently-applicable READ password for the RFID tag 14. This may be stored electronically in the verifier 20, or received in other ways. In this way it can be ensured that the READ password will be provided only to a verifier that has the right to fully read the label, thus limiting the amounts of unwanted attempts to access the relevant product information via the RFID tag 14.
- Steps 4 and 5 "Accessing the RFID tag”: The user uses the READ password to trigger the RFID tag 14 to reveal a unique identifier that is only valid for that specific reading operation.
- Steps 6 and 7 "Verifying the item”: The unique identifier revealed by the RFID tag 14 can then be passed to the database 30, which can provide verification to the user that it is currently the correct identifier for the RFID tag 14.
- authentication of the verifier and secure communication between the verifier and the trusted third party may take advantage of existing Internet security technologies.
- the internal logic of the RFID tag replaces now-used READ password and unique identifier with a new READ password and unique identifier. If subjected again to the previous READ password, by a malicious user who has obtained it by eavesdropping, for example, the RFID tag 14 will not respond.
- This cryptographic scheme is an encoding scheme in which a different cipher text is generated each time the correct READ password is provided to the tag, arranged in such a way that it is difficult or impossible for a malicious party to generate the correct cipher text without knowing a secret contained in the tag.
- the tag initially contains a local secret "S" (a 128-bit number, for example), part of which is used as the READ password "RS" (the first 48 bits, for example).
- RS the READ password
- the local secret "S” is updated.
- the local secret "S” is provided as an input to a hash function H and the memory register in the tag containing "S” is updated to the resulting output "S 1 ".
- the READ password is hence updated to "RS 1 " (i.e. the first 48 bits of "S 1 ").
- the output of the tag is generated by providing secret "S 1 " as the input to a function G, which may also be a one-way or hash function.
- the output value "O 1 " is transmitted to the reader and it is this value that can be used to verify the authenticity of the product.
- provision of the correct READ password "RS 1 " would result in the local secret being updated to "S 2 ", and the output value "O 2 " being transmitted to the reader .
- the values of the outputs "O", the local secrets “S” and the reading passwords "RS” are different and unlinkable to one another. Since the function is one-way it is not possible (i.e. it is computationally unfeasible) to retrieve the input and the reading password information from the output. The only attack that is realistically possible is tampering with the information of the tag. In this case, an attacker may manage to access the secret within the tag.
- the above scheme provides a property of forward security thanks to the hash chain characteristics (in particular, the one-way property) or similar characteristics of other one-way functions. The information that the tag has emitted at previous steps can still not be replicated. This feature thus provides security of pedigree information.
- the reader can pass the secret to the trusted third party for verification in order to determine if the product is original or not.
- the status of the product may then be returned to the user via the verifier 20 or otherwise. It is important to notice that the trusted third party generally remains synchronized with the tag.
- the trusted third party may be the only entity in the system that has a complete view of the READ password and the output of the tag. It can resolve a request from a reader with a complexity o(1), but we can say that the retrieval processing time is negligible.
- the trusted third party "generally" remains synchronized with the tag. It will be noticed that a possible lack of synchronization can be caused if, for example, a user (honestly or maliciously) carries out a successful READ operation of the tag, thus causing the tag to update the READ password, but does not then complete the authentication procedure by passing the output or unique identifier to the trusted third party. It will be understood, however, that the system could be set up in such a way as to ensure that this would only allow a lack of synchronization of one READ password in the sequence, since subsequent attempts to carry out a complete authentication procedure will fail.
- the tag will be set to operate only when subjected to a READ password one ahead (in the sequence) of that which will be provided by the trusted third party, so the READ attempt will fail, and the tag will not update itself further.
- the system may thus be set up in such a way as to allow re-synchronization or re-setting, via the third party or the tag, without any substantial decrease in the level of security of the system.
- a trusted third party may delegate access to certain items to specific verifier authorities.
- the verifier authorities can then select the appropriate read password to access a tag and verify a tag with an offline operation.
- a method to synchronize the trusted verifier and the trusted third party may still be required, however. This means that if the reader is trusted, a proxy for the authentication service can be operated on the reader for selected tags (i.e. releasing certain secrets to the reader so that it can determine a passcode and verify the tag response).
- an appropriate label with an RFID tag may be applied to each packet or bottle.
- An outer box may also have an appropriate label with an RFID tag, allowing a wholesaler to check that the box is original and contains authorised products. Once the box has been verified and unpacked, each single product may be verified before being put on sale and distributed to retailers. After that, the individual products are distributed to pharmaceutical retailers before being sold to the final users.
- the products may be verified and the pedigree information may be updated. It will be noticed that at each step a verifier may obtain access to the pedigree information of the product and receive an assurance that the product is original.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
- Warehouses Or Storage Devices (AREA)
- Radar Systems Or Details Thereof (AREA)
- Geophysics And Detection Of Objects (AREA)
- Mobile Radio Communication Systems (AREA)
- Near-Field Transmission Systems (AREA)
Abstract
Description
Claims
Priority Applications (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2007800109036A CN101410853B (en) | 2006-03-31 | 2007-03-12 | Method and device for obtaining item information using RFID tags |
CA002644320A CA2644320A1 (en) | 2006-03-31 | 2007-03-12 | Method and device for obtaining item information using rfid tags |
DE602007008702T DE602007008702D1 (en) | 2006-03-31 | 2007-03-12 | METHOD AND DEVICE FOR OBTAINING ARTICLE INFORMATION USING RFID LABELS |
JP2009502183A JP5139415B2 (en) | 2006-03-31 | 2007-03-12 | Article information acquisition method and apparatus |
EP07712888A EP2002382B1 (en) | 2006-03-31 | 2007-03-12 | Method and device for obtaining item information using rfid tags |
KR1020087022405A KR101276902B1 (en) | 2006-03-31 | 2007-03-12 | Method and device for obtaining item information using rfid tags |
AT07712888T ATE479163T1 (en) | 2006-03-31 | 2007-03-12 | METHOD AND DEVICE FOR OBTAINING ITEM INFORMATION USING RFID LABELS |
US12/295,057 US8791794B2 (en) | 2006-03-31 | 2007-03-12 | Method and device for obtaining item information using RFID tags |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP06251855.0 | 2006-03-31 | ||
EP06251855 | 2006-03-31 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2007113464A1 true WO2007113464A1 (en) | 2007-10-11 |
Family
ID=36922158
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB2007/000851 WO2007113464A1 (en) | 2006-03-31 | 2007-03-12 | Method and device for obtaining item information using rfid tags |
Country Status (9)
Country | Link |
---|---|
US (1) | US8791794B2 (en) |
EP (1) | EP2002382B1 (en) |
JP (1) | JP5139415B2 (en) |
KR (1) | KR101276902B1 (en) |
CN (1) | CN101410853B (en) |
AT (1) | ATE479163T1 (en) |
CA (1) | CA2644320A1 (en) |
DE (1) | DE602007008702D1 (en) |
WO (1) | WO2007113464A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010133266A1 (en) * | 2009-05-20 | 2010-11-25 | Feustel, Dietmar | Unique identifier, method for providing said unique identifier and use of said unique identifier |
WO2012163922A1 (en) * | 2011-05-31 | 2012-12-06 | Copy Stop Systems Aps | A system for verifying a communication device and a security communication device |
CN103996059A (en) * | 2014-05-27 | 2014-08-20 | 翟冬青 | Informatization system and method for article tags |
JP2014241655A (en) * | 2008-06-27 | 2014-12-25 | オリダオ | Method and system for verifying a series of events generated in device |
Families Citing this family (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7162035B1 (en) | 2000-05-24 | 2007-01-09 | Tracer Detection Technology Corp. | Authentication method and system |
US8171567B1 (en) | 2002-09-04 | 2012-05-01 | Tracer Detection Technology Corp. | Authentication method and system |
US8820639B2 (en) * | 2006-11-03 | 2014-09-02 | Assa Abloy Ab | Security feature RFID card |
US7995196B1 (en) | 2008-04-23 | 2011-08-09 | Tracer Detection Technology Corp. | Authentication method and system |
US8607057B2 (en) * | 2009-05-15 | 2013-12-10 | Microsoft Corporation | Secure outsourced aggregation with one-way chains |
US11740294B2 (en) | 2010-06-03 | 2023-08-29 | Midtronics, Inc. | High use battery pack maintenance |
US20110300416A1 (en) | 2010-06-03 | 2011-12-08 | Bertness Kevin I | Battery pack maintenance for electric vehicle |
US10046649B2 (en) | 2012-06-28 | 2018-08-14 | Midtronics, Inc. | Hybrid and electric vehicle battery pack maintenance device |
CA2726748A1 (en) * | 2010-12-16 | 2012-06-16 | Evgeny Lishak | A method of providing brand assurance and item authenticity using payment card industry infrastructure |
TW201234294A (en) * | 2011-07-22 | 2012-08-16 | Yue Jie Technology Co Ltd | Product counterfeit-proof system |
US9747600B2 (en) * | 2012-03-30 | 2017-08-29 | United State Poastal Service | Item status tracking |
EP2849118B1 (en) * | 2012-05-07 | 2018-01-10 | Han Yong Cho | Method for generating authentication code of label |
US11325479B2 (en) | 2012-06-28 | 2022-05-10 | Midtronics, Inc. | Hybrid and electric vehicle battery maintenance device |
US9659177B1 (en) * | 2012-09-24 | 2017-05-23 | EMC IP Holding Company LLC | Authentication token with controlled release of authentication information based on client attestation |
US10843574B2 (en) * | 2013-12-12 | 2020-11-24 | Midtronics, Inc. | Calibration and programming of in-vehicle battery sensors |
US20150195274A1 (en) * | 2014-01-06 | 2015-07-09 | Semisysco Co., Ltd. | System and method of certificating a genuine article |
CH709353A2 (en) * | 2014-03-12 | 2015-09-15 | Eric Bauer | A method of checking the authenticity of an object. |
US20150347712A1 (en) * | 2014-05-27 | 2015-12-03 | Amerisourcebergen Specialty Group, Inc. | System and method for product distribution and tracking |
CN104261032B (en) * | 2014-08-04 | 2016-09-14 | 珠海格力电器股份有限公司 | Full-automatic scanning stacking device and method |
CA2978651A1 (en) * | 2015-03-06 | 2016-09-15 | Stevanato Group S.P.A. | Methods and systems for selectively providing information to a targeted community of people |
JP2017059970A (en) * | 2015-09-16 | 2017-03-23 | 株式会社サードプラステクノロジー | Authenticity determination system and server |
EP3426568B1 (en) * | 2016-03-11 | 2022-05-25 | TrackTech Solutions Corp. | Anti-diversion, anti-counterfeiting product packaging |
US20190347888A1 (en) * | 2016-07-13 | 2019-11-14 | Botosoft Technologies Ltd | Document authentication system |
CN106529895A (en) * | 2016-09-23 | 2017-03-22 | 中国农业科学院农业信息研究所 | Science and technology project information management method based on two-dimensional code |
US12056691B2 (en) * | 2016-09-30 | 2024-08-06 | Cable Television Laboratories, Inc. | Systems and methods for securely tracking consumable goods using a distributed ledger |
US11054480B2 (en) | 2016-10-25 | 2021-07-06 | Midtronics, Inc. | Electrical load for electronic battery tester and electronic battery tester including such electrical load |
JP2018129103A (en) * | 2017-02-06 | 2018-08-16 | 富士フイルム株式会社 | Recording system and recording method |
US11213773B2 (en) | 2017-03-06 | 2022-01-04 | Cummins Filtration Ip, Inc. | Genuine filter recognition with filter monitoring system |
US11513160B2 (en) | 2018-11-29 | 2022-11-29 | Midtronics, Inc. | Vehicle battery maintenance device |
US11566972B2 (en) | 2019-07-31 | 2023-01-31 | Midtronics, Inc. | Tire tread gauge using visual indicator |
US11545839B2 (en) | 2019-11-05 | 2023-01-03 | Midtronics, Inc. | System for charging a series of connected batteries |
US11668779B2 (en) | 2019-11-11 | 2023-06-06 | Midtronics, Inc. | Hybrid and electric vehicle battery pack maintenance device |
US11474153B2 (en) | 2019-11-12 | 2022-10-18 | Midtronics, Inc. | Battery pack maintenance system |
US11973202B2 (en) | 2019-12-31 | 2024-04-30 | Midtronics, Inc. | Intelligent module interface for battery maintenance device |
US11486930B2 (en) | 2020-01-23 | 2022-11-01 | Midtronics, Inc. | Electronic battery tester with battery clamp storage holsters |
Family Cites Families (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5912405A (en) * | 1994-09-27 | 1999-06-15 | Novo Nordisk A/S | Enhancers such as acetosyringone |
US6130623A (en) * | 1996-12-31 | 2000-10-10 | Lucent Technologies Inc. | Encryption for modulated backscatter systems |
GB9724183D0 (en) * | 1997-11-14 | 1998-01-14 | British Tech Group | Identification system |
BR9913024B1 (en) * | 1998-08-14 | 2011-06-28 | portable radio frequency identification (rfid) device, and processes for using a radio frequency identification device. | |
JP2000339420A (en) * | 1999-05-26 | 2000-12-08 | Matsushita Electric Works Ltd | Id information non-contact communication system |
US6994262B1 (en) * | 1999-06-16 | 2006-02-07 | Vanguard Identification Systems, Inc. | Printed sheet products with integral, removable, radio frequency identification elements |
US7204652B2 (en) * | 1999-06-16 | 2007-04-17 | Vanguard Identification Systems, Inc. | Printed planar radio frequency identification elements |
KR20010068679A (en) * | 2000-01-07 | 2001-07-23 | 박상관 | Radio frequency electronic identification tag for security and method for determining the accessibility to an external device by transmitting and receiving radio frequency signal data with an electronic identification tag |
CA2399092A1 (en) * | 2000-02-04 | 2001-08-09 | 3M Innovative Properties Company | Method of authenticating a tag |
JP4536876B2 (en) * | 2000-06-13 | 2010-09-01 | 株式会社カイ | Counterfeit goods distribution prevention system |
EP1339015A1 (en) * | 2002-02-20 | 2003-08-27 | Carolyn Marie Winter | A radio frequency identification tag location system |
JP4434549B2 (en) * | 2002-03-07 | 2010-03-17 | 株式会社日立製作所 | Management apparatus and management method |
US6747560B2 (en) * | 2002-06-27 | 2004-06-08 | Ncr Corporation | System and method of detecting movement of an item |
US7071043B2 (en) * | 2002-08-15 | 2006-07-04 | Micron Technology, Inc. | Methods of forming a field effect transistor having source/drain material over insulative material |
US7650364B2 (en) * | 2002-10-09 | 2010-01-19 | Hewlett-Packard Development Company, L.P. | Portable database system |
JP2004246887A (en) * | 2003-01-24 | 2004-09-02 | Sougoushouken Inc | Merchandise identification system |
CN1751326A (en) * | 2003-01-29 | 2006-03-22 | 诺基亚有限公司 | Electronics with an RFID module in the cover |
EA007961B1 (en) * | 2003-04-01 | 2007-02-27 | Ми-Конг Пак | Mobile communication terminal having a function of reading out information from contactless type communication tag and method for providing information of whether an article is genuine or not |
KR100497630B1 (en) * | 2003-05-01 | 2005-07-07 | (주)브랜드인칩 | Portable RF-tag reader for verifying a genuine article |
CN100530227C (en) * | 2003-08-29 | 2009-08-19 | 赛宝技术公司 | RFID system with selectable backscatter parameters |
JP3909848B2 (en) * | 2003-09-19 | 2007-04-25 | 本田技研工業株式会社 | Product lifecycle information management system |
US7026935B2 (en) * | 2003-11-10 | 2006-04-11 | Impinj, Inc. | Method and apparatus to configure an RFID system to be adaptable to a plurality of environmental conditions |
US7176784B2 (en) * | 2004-01-21 | 2007-02-13 | Battelle Memorial Institute K1-53 | Multi-mode radio frequency device |
KR100603203B1 (en) * | 2004-05-25 | 2006-07-24 | 삼성전자주식회사 | An image forming apparatus having a wireless recognition function and a method of using the image forming apparatus |
JP4445331B2 (en) * | 2004-05-27 | 2010-04-07 | 日本電信電話株式会社 | Database apparatus, system and program |
US7118036B1 (en) * | 2004-06-22 | 2006-10-10 | Ncr Corporation | Mobile inventory management system |
US7284704B2 (en) * | 2004-06-28 | 2007-10-23 | International Barcode Corporation | Combined electromagnetic and optical communication system |
JP2006065538A (en) | 2004-08-26 | 2006-03-09 | Fujitsu Ltd | Wireless tag system, wireless tag access control device, wireless tag access control method, wireless tag access control program, and wireless tag |
US20060158308A1 (en) * | 2005-01-06 | 2006-07-20 | Mcmullen Benjamin C A | System and method for automatically generating, collecting, monitoring and acting on information in an institutional setting |
US7591422B2 (en) * | 2005-02-10 | 2009-09-22 | Sensormatic Electronic Corporation | Techniques to reduce false alarms, invalid security deactivation, and internal theft |
JP4490321B2 (en) * | 2005-04-06 | 2010-06-23 | ローム株式会社 | Thermal print head and printer with wireless communication function using the same |
KR100739709B1 (en) * | 2005-06-10 | 2007-07-13 | 삼성전자주식회사 | Method and apparatus for outputting data using information of RDF tag |
US7275690B1 (en) * | 2005-07-01 | 2007-10-02 | Ncr Corporation | System and method of determining unprocessed items |
KR20080033998A (en) * | 2005-07-25 | 2008-04-17 | 실버브룩 리서치 피티와이 리미티드 | Product item with coded data identifying the layout |
JP4289338B2 (en) * | 2005-09-29 | 2009-07-01 | 沖電気工業株式会社 | RFID tag communication system, RFID tag and induction antenna device |
US20070141997A1 (en) * | 2005-12-15 | 2007-06-21 | Symbol Technologies, Inc. | Radio frequency identification (RFID) antenna integration techniques in mobile devices |
US7970357B2 (en) * | 2007-07-30 | 2011-06-28 | Bae Systems Information And Electronic Systems Integration Inc. | Transponder with stabilized oscillator |
-
2007
- 2007-03-12 EP EP07712888A patent/EP2002382B1/en active Active
- 2007-03-12 US US12/295,057 patent/US8791794B2/en active Active
- 2007-03-12 KR KR1020087022405A patent/KR101276902B1/en active IP Right Grant
- 2007-03-12 CN CN2007800109036A patent/CN101410853B/en active Active
- 2007-03-12 AT AT07712888T patent/ATE479163T1/en not_active IP Right Cessation
- 2007-03-12 CA CA002644320A patent/CA2644320A1/en not_active Abandoned
- 2007-03-12 DE DE602007008702T patent/DE602007008702D1/en active Active
- 2007-03-12 WO PCT/GB2007/000851 patent/WO2007113464A1/en active Application Filing
- 2007-03-12 JP JP2009502183A patent/JP5139415B2/en active Active
Non-Patent Citations (7)
Title |
---|
BERTHOLD, OLIVER: "RFID: Verbraucherängste und Verbraucherschutz", WIRTSCHAFTSINFORMATIK, no. 47, 2005, pages 422 - 430, XP002397695, Retrieved from the Internet <URL:www.wirtschaftsinformatik.de/wi_artikel.php?sid=1732> [retrieved on 20060905] * |
DIRK HENRICI ET AL: "Tackling Security and Privacy Issues in Radio Frequency Identification Devices", PERVASIVE COMPUTING LECTURE NOTES IN COMPUTER SCIENCE, vol. LCNS3001, no. 588, 2004, Berlin Heidelberg, pages 219 - 224, XP019004321 * |
EPC GLOBAL: "Specification for RFID Air Interface. EPC (tm) Radio-Frequency Indentity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz - 960 MHz (Version 1.0.9)", INTERNET CITATION, 31 January 2005 (2005-01-31), XP007902164, Retrieved from the Internet <URL:http://www.nepc.gs1.org.sg/epcglobal/stdsdocs/EPC_class1_gen2_UHFRFID _protocol_1-0-9.pdf> [retrieved on 20070425] * |
HENRICI D ET AL: "Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers", PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, 2004. PROCEEDINGS OF THE SECOND IEEE ANNUAL CONFERENCE ON, PISCATAWAY, NJ, USA,IEEE, 14 March 2004 (2004-03-14), pages 149 - 153, XP010689745, ISBN: 0-7695-2106-1 * |
JUELS, ARI: "Strengthening EPC tags against cloning", WISE'05, 2 September 2005 (2005-09-02), Köln, XP002397696, ISBN: 1-59593-142-2, Retrieved from the Internet <URL:http://portal.acm.org/> [retrieved on 20060905] * |
STAAKE, THORSTEN: "Extending the EPC Network - The Potential of RFID in Anti-Counterfeiting", 2005 ACM SYMPOSIUM ON APPLIED COMPUTING, 17 March 2005 (2005-03-17), pages 1607 - 1612, XP002397697, ISBN: 1-58113-964-0, Retrieved from the Internet <URL:http://portal.acm.org/> [retrieved on 20060905] * |
WEIS, STEPHEN A.: "Security and privacy aspects of low-cost radio frequency identification systems", SECURITY IN PERVASIVE COMPUTING, vol. 2802/2004, 27 January 2004 (2004-01-27), pages 201 - 212, XP002397694, ISSN: 0302-9743, ISBN: 9783540208877, Retrieved from the Internet <URL:www.springerlink.com> [retrieved on 20060905] * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2014241655A (en) * | 2008-06-27 | 2014-12-25 | オリダオ | Method and system for verifying a series of events generated in device |
WO2010133266A1 (en) * | 2009-05-20 | 2010-11-25 | Feustel, Dietmar | Unique identifier, method for providing said unique identifier and use of said unique identifier |
US8578162B2 (en) | 2009-05-20 | 2013-11-05 | Rolf Jentzsch | Unique identifier, method for providing the unique identifier and use of the unique identifier |
WO2012163922A1 (en) * | 2011-05-31 | 2012-12-06 | Copy Stop Systems Aps | A system for verifying a communication device and a security communication device |
US9323230B2 (en) | 2011-05-31 | 2016-04-26 | Copy Stop Systems Aps | System for verifying a communication device and a security communication device |
CN103996059A (en) * | 2014-05-27 | 2014-08-20 | 翟冬青 | Informatization system and method for article tags |
Also Published As
Publication number | Publication date |
---|---|
DE602007008702D1 (en) | 2010-10-07 |
KR101276902B1 (en) | 2013-06-19 |
US8791794B2 (en) | 2014-07-29 |
JP5139415B2 (en) | 2013-02-06 |
ATE479163T1 (en) | 2010-09-15 |
CN101410853B (en) | 2011-07-20 |
EP2002382B1 (en) | 2010-08-25 |
JP2009531251A (en) | 2009-09-03 |
KR20080108241A (en) | 2008-12-12 |
EP2002382A1 (en) | 2008-12-17 |
CA2644320A1 (en) | 2007-10-11 |
CN101410853A (en) | 2009-04-15 |
US20090273451A1 (en) | 2009-11-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8791794B2 (en) | Method and device for obtaining item information using RFID tags | |
EP2100263B1 (en) | Controlling data access to and from an rfid device | |
CN100375111C (en) | Anti-counterfeiting verification method and anti-counterfeiting system based on radio frequency identification technology | |
Juels | Strengthening EPC tags against cloning | |
US8421593B2 (en) | Apparatus, systems and methods for authentication of objects having multiple components | |
US8917159B2 (en) | Fully secure item-level tagging | |
JP5319621B2 (en) | Method and system for preventing counterfeiting, diversion and piracy of products | |
KR100969730B1 (en) | A system and method for radio frequency identification and multicore tags including a plurality of radio frequency identification tags | |
JP5739876B2 (en) | Unique identifiers, methods for providing unique identifiers, and use of unique identifiers | |
WO2017116303A1 (en) | Secure dual-mode anti-counterfeit product authentication methodology and system | |
CN102831529A (en) | Radio frequency based commodity information identification method and system | |
KR100512064B1 (en) | contactless type communication tag and portable tag reader for verifying a genuine article | |
CN115511019A (en) | Anti-counterfeiting verification method for binding RFID (radio frequency identification) label and article bar code | |
KR101527582B1 (en) | System for verifying product genuineness using double security key and method thereof | |
US20090040023A1 (en) | RF Transponder for Off-Line Authentication of a Source of a Product Carrying the Transponder | |
Lehtonen et al. | Features, identity, tracing, and cryptography in product authentication | |
JP2008233975A (en) | Information communicating device, information collectively managing device, and information processing system | |
CN114565393B (en) | A whole-industry chain product traceability authentication method and system based on blockchain technology | |
Tan et al. | A robust and secure RFID-based pedigree system (short paper) | |
RU2814089C2 (en) | Methods and systems for automatic object recognition and authenticity verification | |
Balinsky et al. | Anti-counterfeiting using memory spots | |
Soppera et al. | RFID Security and Privacy—Issues, Standards, and Solutions | |
Choi et al. | An RFID-based Track-and-trace Anti-counterfeiting System. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07712888 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007712888 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2644320 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020087022405 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200780010903.6 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 12295057 Country of ref document: US Ref document number: 2009502183 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |